• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

Extracts from this document...

Introduction

1. Software and network security Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it. Diskless networks: This is where the computer at the workstation doesn?t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC?s in the workstation. This can also be done over the ?cloud? using applications that emulate the behaviour of your computer system. Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. ...read more.

Middle

This is done by the use of a tunnel which is an agreed route for encrypted traffic. This creates a trusted connection on a system which is not trusted. This helps prevent packet sniffing and fraudulent authentication. Intrusion detection systems: This monitors network activity for someone trying to break in or compromise a system. Some of these systems are passive and will record any suspicious activity for the network administrator and others are reactive which will try to reconfigure the firewall automatically to block the intrusion. Passwords: This is a word that must be entered to allow access to the system which is chosen by the user. Many organisations have password policies, for example, not to write down the password, change the password every month or so or to choose a password which is not contained within a dictionary. Many systems will lock a user out after 3 password attempt, then the user must go to the network administrator and provide suitable proof of identity and either remind the user of the password or create a new one. ...read more.

Conclusion

If the data or information has been backed up in an external media device in a safe place such as on an optical disc or on paper then the required data/information only needs to be retrieved from its safe location and the data/information is recovered, this reduces the downtime resulting from the disaster. Another form of disaster recovery is the use of a system backup, which is a mirror image of the computer systems used by the business; this means if there is a failure with one or all of the systems then the backup system can be put in place to prevent downtime caused by the failure. If damage occurs to the hardware of the system then spare parts that are kept in case of hardware failure are a good idea, however this is not very cost effective. Alternatively, in the case of a fire or flood and an entire system has been made unusable then a whole system replacement may be required, this may be stored as a backup in a safe place or bought in reaction to the disaster, this is the least effective way to prevent downtime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    Human Errors: is when someone makes a mistake which results in data being lost. Incidents such as people accidentally deleting files and pulling plugs and such. 5. Theft: Theft occurs when criminals gain access to an office building or other work environment and physically steal hardware and other entities

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    Those include technical measures (such as firewalls) and organisational measures (such as staff training). Also subjects are allowed/have the right to make changes to wrong information The data protection act has an effect on everything and every company, the Rufus supermarket is also affected by this act.

  1. Peer reviewed

    Organisational system security - The possible security issues which exist within the FilmPoster.com system

    3 star(s)

    posters, asking them to dial a number in regards to their details such as bank accounts and once the number has been dialled, the customer is told to enter their account details and PIN's. Phishing is mainly carried out using email or instant messaging directing users to enter their details

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    In token passing a node takes possession of a small frame called a token and attaches the data, control information and the specified target. Then the sending node will send it off, if a computer not targeted receives the token it will simply forward it off and when the target

  1. Computer systems assignment 1

    This is speed of data exchange. Also the speed of data exchange is defined by frequency of a bus. It states how many bits are sent in particular time which is usually per second. For example a CPU working with applications sends binary data, information about a picture and graphics

  2. Internet security

    The current UK legislation covering data held about living individual people is the data protection 1998. This Act is a law designed protect people privacy so that data cannot be misuse.

  1. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    The procedures must be regularly reviewed and updated, these updates need to reflect what was outlined to be improved in the review and needs to be in date with current knowledge on security threats. However, the update may have a negative impact on the existing systems and so should be tested before applied to the entire organisations systems.

  2. Small Office Network Implementation - hardware and security.

    Internet and Networking Devices Ethernet Hub Jump to: navigation, search Source - ConceptDraw NetDiagrammer Hubs work at the physical layer (Layer 1) of the OSI (Open System Interconnection) model. Using an Ethernet hub can connect multiple twisted pair or fiber optic Ethernet devices together, making them act as a single segment.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work